Home / Blog / All Blog Posts

Alert Logic Blogs 

Vulnerability Management in the Cloud: A Fresh Approach

Vulnerability Management in the Cloud: A Fresh Approach

Whether you are running a server under your desk or have hundreds of servers at data centers around the world, you know that you need to make sure your data and applications are protected from hackers trying to exploit known vulnerabilities.

Where is IPv1, 2, 3,and 5?

Where is IPv1, 2, 3,and 5?

Discover the evolution of Internet Protocols with a focus on ipv2 and its predecessor, ipv1. Learn about their roles in network communication.

Review of Htaccess Attacks

There has been a lot of excitement around the new htaccess authentication bypass tool called HTExploit (HiperText Access Exploit [1]). This tool abuses a very old attack made possible due to a common htaccess configuration issue. Being an industry that loves to name...

Discovering Modern CSRF Patch Failures

Cross-site request forgery (CSRF/XSRF) vulnerabilities allow an attacker to perform authenticated actions without authenticating as the user.

Java 7 ClassFinder Restricted Package Bypass

Intro There has been a lot of talk over the past couple of days about the new Java 7 exploit seen in the wild. Most of this talk covers the payload and distribution ([1]), but not many people are talking about the actual exploit and how it works in its excellent...

IDS/IPS Signature Bypassing (Snort)

At Fortra's Alert Logic, we work with many signatures to provide protection for clients. We often receive signatures that need to be changed due to a variety of detection issues. In this post we’ll see issues found regularly with Snort signatures. First, groups making...

Auditing Security Checklist for AWS

Our friends over at Amazon Web Services have just released their Auditing Security Checklist for Use of AWS. This important document builds on the previously released Operational Checklists for AWS. AWS deserves kudos for putting this document front and center, as...

PCI DSS Requirement 10.6 – Log Data Collection

As you likely know by now, the PCI DSS 3.0 standard went into effect on January 1, 2014. You have until January 1, 2015 to move to the new standard. While many of the changes in the PCI DSS 3.0 requirements are clarifications, there are several new requirements that...

Ready to Protect Your Company with Alert Logic?